BBS: Inland Empire Archive Date: 03-28-93 (12:48) Number: 201 From: DIRK THEURER Refer#: NONE To: LEE MADAJCZYK Recvd: NO Subj: Cnd-Det Routines 1/8 Conf: (2) Quik_Bas
LM> DT> ' (c)opyright 1993, Dirk Theurer LM> DT> ' This code is placed in the public domain. Use as you see fit. LM> One quick question, Dick. Er, that should be 'Dirk'. %-} LM> I publish QuickBASIC Scrapbook ... LM> My question for you is, did you copyright the code or are you LM> releasing it into public domain? ... LM> I will be required to remove the Copyright message (so you LM> can't sue me later Ah. A couple of things - 1) CND-DET (the entire program) is (c)opyrighted already (not just those two routines); and 2) my intent was to ensure that no one uses the routines 'for profit' or that anyone else puts their own name to them... I don't see that 'public domain' and '(c)opyright' are mutually exclusive. I definitely don't want to stop you from publishing this in QBS but I see no conflict there as long as I give you explicit permission. Before I do so, I'd like to point out something else - 1) I mentioned that those routines are setup to use a FOSSIL; 2) I tend to do somewhat excessive error-checking/correcting; and 3) there is so much unnecessary 'other' code in there it isn't funny. I suspect that by the time modifications to overcome those idiosyncracies are made that (c)opyright no longer applies - remember that those routines are 'cut' directly from a program with all the considerations for that other program. I can't remember exactly but it's possible there are SHARED variables in use even!... %-] There are definitely CALLs made to other routines I didn't post. I'd suggest that someone re-write it before it becomes useful to publish. None of the 'principles' (COM routines at 1200bps, CND (CID) packet format, etc) are particularly unusual. Probably the whole thing could be done in about 40 lines of code (versus my 460+)... which would definitely result in something that does not infringe on my (c)opyright. (I'd do this myself but have found myself in the middle of a starting a commercial venture with VERY little time left over...) To get back 'on-topic', here's a short outline (psuedo-code) for such: 'open and set port to 1200bps, 8N1 'wait for incoming string of 30 'U's and trailing ASCII 4 (CTRL-D) 'next char is number of chars to follow (actual CND info) 'loop to read 'number of chars - 1' 'if one char, then ' number is either 'out of area' ("O") or 'private' ("P") 'else ' following number of chars is 'useful' CND info 'last char is CRC value LM> BTW: I think this will be a useful routine, as Caller ID is LM> beginning to pop up everywhere. :-) That's why I placed it here. I hope someone _does_ find a use for it/them and does modify so it's somewhat more er, 'publishable'. Dirk --- * Origin: RAVE * Burnaby, BC (1:153/810)
Books at Amazon:
Back to BASIC: The History, Corruption, and Future of the Language
Hackers: Heroes of the Computer Revolution (including Tiny BASIC)
Go to: The Story of the Math Majors, Bridge Players, Engineers, Chess Wizards, Scientists and Iconoclasts who were the Hero Programmers of the Software Revolution
The Advent of the Algorithm: The Idea that Rules the World
Moths in the Machine: The Power and Perils of Programming
Mastering Visual Basic .NET